They knew that America was well advanced technologically and that they digitalized almost all their activities .This strength was used as a leeway to this great nation.This led to one of America’s greatest thorn in the flesh- cyber terrorism. It refers to the use of the internet by terrorists e. sending mails to real criminal cases, which result into virtual or physical loss (Council of Europe, 4). It may also be defined as vandalism, intimidation or coercing people to do things against their will or purchase products offered to them, (Bidgoli, 21). In this case, the attacks are not politically motivated but are an effort of certain individuals to instill fear and force others to do what they want. Or else damage their reputation.Some researchers argue that cyber terrorism is not real and that it is just one of America’s ways to seek sympathy or others even go ahead and say it’s a means used by this country to instill psychological torture and among its citizens. Others reveals that it is a means used to create job opportunities by certain companies in America by creating a virus and spreading it then creating an anti-virus for the same to profits. These claims have been disputed by scholars who claim that the attack have become one of those that no one knows who is likely to conduct the attack (faceless terrorism). They alos lack knowledge of when they will occur does not make the fact less real.Lech (15), posits how and why these cyber terrorist attack. Just like the way terrorist inflict fear among people when they physically attack a place through bombing they instill the same fear when they undertake cyber-attacks. Instead of making people fear a particular place, which they have bombed, cyber terrorists inflict fear in the computer technologies.Secondly, the speculator factor is a vital element to consider. They always make sure their attacks are speculative in nature. This means that the targeted organization or institution should incur direct huge losses or suffer negative publicity. For instance, Amazon.com website was shut down in 1999 due to Denial of Service (DOS) attack. This cost it very huge losses but the worst part was the negative publicity the attack created. Then there is the vulnerability factor. In this case, the aim of the terrorist is to expose the vulnerability of the targeted organization. They achieve this by causing denial of service to the
, 2012. Print.
Bidgoli, Hossein.Handbook of Information Security, Information Warfare, Social and legal.Wiley publishers. 2006. Print.
Balkhi, Seyd.25 biggest cyber-attacks in History.2015. Print.
Center of Excellence defense Against Terrorism; Responses to Cyber Terrorism. IOS Press. Print.
Please type your essay title, choose your document type, enter your email and we send you essay samples